Advancements in Cybersecurity and Post-Quantum Cryptography

The recent publications in the field highlight a significant shift towards enhancing cybersecurity measures, particularly in the context of emerging quantum computing technologies and the increasing complexity of network infrastructures. A notable trend is the development of post-quantum cryptographic algorithms and their integration into existing systems to safeguard against future quantum threats. This includes innovative approaches to secure communication protocols, such as the introduction of post-quantum stealth address protocols and lightweight key-encapsulation mechanisms designed for resource-constrained devices. Additionally, there is a growing emphasis on improving the security and efficiency of Internet of Things (IoT) devices and networks, with research focusing on attack mitigation strategies, secure routing protocols, and the development of comprehensive security frameworks that span from hardware to application layers. Another key area of advancement is in the optimization of cryptographic computations, with novel hardware architectures and algorithms being proposed to accelerate operations like polynomial multiplication and sparse Fourier transforms, thereby enhancing the performance of encryption schemes and signal processing applications.

Noteworthy Papers

  • SyzParam: Introducing Runtime Parameters into Kernel Driver Fuzzing: Introduces a novel fuzzing framework that significantly improves driver code coverage and bug-detection capabilities, identifying 30 unique bugs in the latest kernel upstreams.
  • Introducing Post-Quantum algorithms in Open RAN interfaces: Demonstrates the integration of post-quantum cryptography into Open RAN interfaces without compromising performance, reinforcing security against quantum attacks.
  • Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism: Proposes a lightweight PQC-KEM suitable for resource-constrained devices, offering significant improvements in area requirement and operational frequency compared to state-of-the-art implementations.

Sources

SyzParam: Introducing Runtime Parameters into Kernel Driver Fuzzing

Introducing Post-Quantum algorithms in Open RAN interfaces

Attack Mitigation in Gateways of Pervasive Systems

Adaptive Attack Mitigation for IoV Flood Attacks

One-Time Signature Based on Pseudorandom Number Generator

The Continuous Logarithm in the Complex Circle for Post-Quantum Cryptographic Algorithms

High-Throughput, Energy-Efficient RRAM-Based In-Memory Computing LPN Accelerator

A comprehensive survey on RPL routing-based attacks, defences and future directions in Internet of Things

Spectrum Analysis with the Prime Factor Algorithm on Embedded Systems

Bridging the Security Gap: Lessons from 5G and What 6G Should Do Better

Cybersecurity and Frequent Cyber Attacks on IoT Devices in Healthcare: Issues and Solutions

A Fully Pipelined FIFO Based Polynomial Multiplication Hardware Architecture Based On Number Theoretic Transform

Ratio Attack on G+G Convoluted Gaussian Signature

Efficient Algorithm for Sparse Fourier Transform of Generalized q-ary Functions

False Sense of Security on Protected Wi-Fi Networks

A Comprehensive Framework for Building Highly Secure, Network-Connected Devices: Chip to App

Post-Quantum Stealth Address Protocols

Rudraksh: A compact and lightweight post-quantum key-encapsulation mechanism

Built with on top of